* Max Feil <mfeil_at_qnx.com>:
> Already did use Wireshark. Here is some more info:
>
> If you look through the traces you'll notice that at some point Squid sends a TCP [FIN, ACK] right in the middle of a connection for seemingly no reason. (Attempting to close the connection) The server ignores this and sends the rest of the data, which Squid responds to with TCP RST (request to reset) since it now believes the connection to be closed.
That sounds like a Checkpoint FW-1 with "smart defense" (aka bloody
stupid crap) somewhere in the path
-- Ralf Hildebrandt Geschäftsbereich IT | Abteilung Netzwerk Charité - Universitätsmedizin Berlin Campus Benjamin Franklin Hindenburgdamm 30 | D-12203 Berlin Tel. +49 30 450 570 155 | Fax: +49 30 450 570 962 ralf.hildebrandt@charite.de | http://www.charite.deReceived on Mon Jan 24 2011 - 17:57:03 MST
This archive was generated by hypermail 2.2.0 : Tue Jan 25 2011 - 12:00:03 MST